Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 60 of 70

Full-Text Articles in Engineering

Developing, Evaluating, And Demonstrating An Open Source Gateway And Mobile Application For The Smartfarm Decision Support System, Caleb D. Fink Jun 2018

Developing, Evaluating, And Demonstrating An Open Source Gateway And Mobile Application For The Smartfarm Decision Support System, Caleb D. Fink

Master's Theses

The purpose of this research is to design, develop, evaluate, and demonstrate an open source gateway and mobile application for the SmartFarm open source decision support system to improve agricultural stewardship, environmental conservation, and provide farmers with a system that they own. There are very limited options for an open source gateway for collecting data on the farm. The options available are: expensive, require professional maintenance, are not portable between systems, improvements are made only by the manufacturer, limited in customization options, difficult to operate, and data is owned by the company rather than the farmer. The gateway is designed …


Polycommit: Building Better Habits Through Gamification, Elliot Fiske Jun 2018

Polycommit: Building Better Habits Through Gamification, Elliot Fiske

Master's Theses

Computer-assisted learning is older than Turing machines, and constantly evolves as technology improves. While some teachers are resistant to using technology in the classroom, “e-learning” techniques are becoming more common in almost every school, from K-12 to universities. As technology becomes more widespread, it becomes crucial to examine the various methodologies of computer-assisted learning and find the techniques that are most effective.

This paper explores the effectiveness of one such methodology, spaced repetition. This technique applies to homework assignments available to students online. We include an exploration of several existing apps that use this technique, and introduce our own novel …


Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson Jun 2018

Funqual: User-Defined, Statically-Checked Call Graph Constraints In C++, Andrew P. Nelson

Master's Theses

Static analysis tools can aid programmers by reporting potential programming mistakes prior to the execution of a program. Funqual is a static analysis tool that reads C++17 code ``in the wild'' and checks that the function call graph follows a set of rules which can be defined by the user. This sort of analysis can help the programmer to avoid errors such as accidentally calling blocking functions in time-sensitive contexts or accidentally allocating memory in heap-sensitive environments. To accomplish this, we create a type system whereby functions can be given user-defined type qualifiers and where users can define their own …


Predicting The Vote Using Legislative Speech, Aditya Budhwar Mar 2018

Predicting The Vote Using Legislative Speech, Aditya Budhwar

Master's Theses

As most dedicated observers of voting bodies like the U.S. Supreme Court can attest, it is possible to guess vote outcomes based on statements made during deliberations or questioning by the voting members. In most forms of representative democracy, citizens can actively petition or lobby their representatives, and that often means understanding their intentions to vote for or against an issue of interest. In some U.S. state legislators, professional lobby groups and dedicated press members are highly informed and engaged, but the process is basically closed to ordinary citizens because they do not have enough background and familiarity with the …


Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly Mar 2017

Normalizer: Augmenting Code Clone Detectors Using Source Code Normalization, Kevin Ly

Master's Theses

Code clones are duplicate fragments of code that perform the same task. As software code bases increase in size, the number of code clones also tends to increase. These code clones, possibly created through copy-and-paste methods or unintentional duplication of effort, increase maintenance cost over the lifespan of the software. Code clone detection tools exist to identify clones where a human search would prove unfeasible, however the quality of the clones found may vary. I demonstrate that the performance of such tools can be improved by normalizing the source code before usage. I developed Normalizer, a tool to transform C …


Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt Mar 2017

Corgi: Compute Oriented Recumbent Generation Infrastructure, Christopher Allen Hunt

Master's Theses

Creating a bicycle with a rideable geometry is more complicated than it may appear, with today’s mainstay designs having evolved through years of iteration. This slow evolution coupled with the bicycle’s intricate mechanical system has lead most builders to base their new geometries off of previous work rather than expand into new design spaces. This crutch can lead to slow bicycle iteration rates, often causing bicycles to all look about the same. To combat this, several bicycle design models have been created over the years, with each attempting to define a bicycle’s handling characteristics given its physical geometry. However, these …


Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney Nov 2016

Encouraging Development Of Mobile Applications As A Service To The Community, Vanessa Marie Forney

Master's Theses

The convenience of mobile applications combined with the efficiency and effectiveness provided by technology has contributed to an increased interest in mobile applications. Local groups and non-profit organizations often utilize outdated, manual processes and don’t have the resources or time to look into improving these systems. For Cal Poly students and other members of the community, this means there is an opportunity to apply technical skills and school projects to address these inefficiencies. This work explores whether a better system can be developed to provide the functionality of the existing system and enhance the experience of users through technology, data …


Inducing Emotional Response In Interactive Media, Keenan M. Reimer Aug 2016

Inducing Emotional Response In Interactive Media, Keenan M. Reimer

Master's Theses

Video games, and entertainment media have been developed for many years, and eliciting emotional experiences is an integral part of that process. Producing and editing game content in order to affect desired emotional experiences can be expensive and cumbersome to developers. This paper presents a study intended to show that such experiences can be affected with simple after-the-fact audio-visual effects. As subjects of the study, participants experience three different emotional states, fear, peace, and none, over three rounds and in three different game environments. They are given a simple narrative in each environment that directs them to gather various objects. …


Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet Jun 2016

Anex: Automated Network Exploitation Through Penetration Testing, Eric Francis Dazet

Master's Theses

Cyber attacks are a growing concern in our modern world, making security evaluation a critical venture. Penetration testing, the process of attempting to compromise a computer network with controlled tests, is a proven method of evaluating a system's security measures. However, penetration tests, and preventive security analysis in general, require considerable investments in money, time, and labor, which can cause them to be overlooked. Alternatively, automated penetration testing programs are used to conduct a security evaluation with less user effort, lower cost, and in a shorter period of time than manual penetration tests. The trade-off is that automated penetration testing …


Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan Jun 2016

Graph-Based Data Visualization In Virtual Reality: A Comparison Of User Experiences, Paul Andrew Sullivan

Master's Theses

Virtual reality is currently in the spotlight, attracting intense scrutiny by the press, technology companies, and consumers. After twenty years of dormancy, the technology has experienced a renaissance following advancements in both hardware and software. Most of these developments, and thus press attention, have been centered on entertainment. However, if the technology is going to continue to grow, it must be useful in a wide variety of situations. This paper explores the effectiveness of visualizing data in virtual reality in comparison to traditional presentations.

In this thesis, we present an approach to displaying data in a virtual reality environment. We …


Polyfs Visualizer, Paul Martin Fallon Jun 2016

Polyfs Visualizer, Paul Martin Fallon

Master's Theses

One of the most important operating system topics, file systems, control how we store and access data and form a key point in a computer scientists understanding of the underlying mechanisms of a computer. However, file systems, with their abstract concepts and lack of concrete learning aids, is a confusing subjects for students. Historically at Cal Poly, the CPE 453 Introduction to Operating Systems has been on of the most failed classes in the computing majors, leading to the need for better teaching and learning tools. Tools allowing students to gain concrete examples of abstract concepts could be used to …


The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky Jun 2016

The Effects Of Latency On 3d Interactive Data Visualizations, Allen Korenevsky

Master's Theses

Interactive data visualizations must respond fluidly to user input to be effective, or so we assume. In fact it is unknown exactly how fast a visualization must run to present every facet within a dataset. An engineering team with limited resources is left with intuition and estimates to determine if their application performs sufficiently well.

This thesis studies how latency affects users' comprehension of data visualizations, specifically 3D geospatial visualizations with large data sets. Subjects used a climate visualization showing temperatures spanning from the 19th to the 21st century to answer multiple choice questions. Metrics like their eye movements, time …


Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity Jun 2015

Toward The Systematization Of Active Authentication Research, Daniel Fleming Gerrity

Master's Theses

Authentication is the vital link between your real self and your digital self. As our digital selves become ever more powerful, the price of failing authentication grows. The most common authentication protocols are static data and employed only once at login. This allows for authentication to be spoofed just once to gain access to an entire user session. Behaviometric protocols continuously consume a user’s behavior as a token of authentication and can be applied throughout a session, thereby eliminating a fixed token to spoof. Research into these protocols as viable forms of authentication is relatively recent and is being conducted …


Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed Signal Chips, David Marusiak Jun 2014

Mos Current Mode Logic (Mcml) Analysis For Quiet Digital Circuitry And Creation Of A Standard Cell Library For Reducing The Development Time Of Mixed Signal Chips, David Marusiak

Master's Theses

Many modern digital systems use forms of CMOS logical implementation due to the straight forward design nature of CMOS logic and minimal device area since CMOS uses fewer transistors than other logic families. To achieve high-performance requirements in mixed-signal chip development and quiet, noiseless circuitry, this thesis provides an alternative toCMOSin the form of MOS Current Mode Logic (MCML). MCML dissipates constant current and does not produce noise during value changing in a circuit CMOS circuits do. CMOS logical networks switch during clock ticks and with every device switching, noise is created on the supply and ground to deal with …


Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling Jun 2014

Toward General Purpose 3d User Interfaces: Extending Windowing Systems To Three Dimensions, Forrest Freiling Reiling

Master's Theses

Recent growth in the commercial availability of consumer grade 3D user interface devices like the Microsoft Kinect and the Oculus Rift, coupled with the broad availability of high performance 3D graphics hardware, has put high quality 3D user interfaces firmly within the reach of consumer markets for the first time ever. However, these devices require custom integration with every application which wishes to use them, seriously limiting application support, and there is no established mechanism for multiple applications to use the same 3D interface hardware simultaneously. This thesis proposes that these problems can be solved in the same way that …


A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns Jun 2014

A System For Cell Phone Anti-Theft Through Gait Recognition, Cameron P. Cstearns Stearns

Master's Theses

Studies show that smartphone thefts are a significant problem in the United States. [30] With many upcoming proposals to decrease the theft-rate of such devices, investigating new techniques for preventing smartphone theft is an important area of research. The prevalence of new biometric identification techniques for smartphones has led some researchers to propose biometric anti-theft measures for such devices, similar to the current fingerprint authentication system for iOS. Gait identification, a relatively recent field of study, seems to be a good fit for anti-theft because of the non-intrusive nature of passive pattern recognition in walking. In this paper, we reproduce …


Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson Jun 2014

Tspoons: Tracking Salience Profiles Of Online News Stories, Kimberly Laurel Paterson

Master's Theses

News space is a relatively nebulous term that describes the general discourse concerning events that affect the populace. Past research has focused on qualitatively analyzing news space in an attempt to answer big questions about how the populace relates to the news and how they respond to it. We want to ask when do stories begin? What stories stand out among the noise? In order to answer the big questions about news space, we need to track the course of individual stories in the news. By analyzing the specific articles that comprise stories, we can synthesize the information gained from …


A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes Jun 2014

A Comparison Of Image Processing Techniques For Bird Detection, Elsa Reyes

Master's Theses

Orchard fruits and vegetable crops are vulnerable to wild birds and animals. These wild birds and animals can cause critical damage to the produce. Traditional methods of scaring away birds such as scarecrows are not long-term solutions but short-term solutions. This is a huge problem especially near areas like San Luis Obispo where there are vineyards. Bird damage can be as high as 50% for grapes being grown in vineyards. The total estimated revenue lost annually in the 10 counties in California due to bird and rodent damage to 22 selected crops ranged from $168 million to $504 million (in …


Future Of Payment Platforms, Salim Benjamin Youssefzadeh Jun 2014

Future Of Payment Platforms, Salim Benjamin Youssefzadeh

Master's Theses

With the vast increase in smartphones, there have been an increasing number of opportunities growing in the app industry. One in particular is the way we deal with money. There are huge overheads in the current payment systems around the world particularly in the United States, many of which include large transaction fees. Many new businesses have grown to solve these inefficiencies and create a new platform that provides a new user experience, security, and convenience among many other things. However, many of these platforms are still centralized, making them more susceptible to attacks. This thesis goes over the various …


Parsing Of Natural Language Requirements, Jamie L. Patterson Dec 2013

Parsing Of Natural Language Requirements, Jamie L. Patterson

Master's Theses

The purpose of this thesis was to automate verification of the software requirements for an implantable cardioverter defibrillator with minimal manual rework. The requirements were written in plain English with only loose stylistic constraints. While full automation proved infeasible, many significant advances were made towards solving the problem, including a framework for storing requirements, a program which translates most of the natural language requirements into the framework, and a novel approach to parts of speech analysis.


Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia Dec 2013

Measuring The Counter/Assumption Model's Effect On Argumentation Quality, Evan D G Ovadia

Master's Theses

This thesis presents a new platform called See the Reason, built upon a tree- structured argumentation model called the Counter/Assumption model. In the Counter/Assumption model, a topic is posted first, then under that topic, reasons for and against, and for each reason, counterarguments, and for any counterargu- ment, more counterarguments. The model enables us to systematically determine whether a claim is “tentatively true” or “tentatively false,” in an effort to motivate people to make their side’s claims tentatively true and the opposing side’s claims tentatively false, thus encouraging conflict. Research suggests that debates with more conflict are better, so this …


Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella Dec 2013

Artist-Driven Fracturing Of Polyhedral Surface Meshes, Tyler Casella

Master's Theses

This paper presents a robust and artist driven method for fracturing a surface polyhedral mesh via fracture maps. A fracture map is an undirected simple graph with nodes representing positions in UV-space and fracture lines along the surface of a mesh. Fracture maps allow artists to concisely and rapidly define, edit, and apply fracture patterns onto the surface of their mesh.

The method projects a fracture map onto a polyhedral surface and splits its triangles accordingly. The polyhedral mesh is then segmented based on fracture lines to produce a set of independent surfaces called fracture components, containing the visible surface …


A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin Dec 2013

A Software Development Kit For Camera-Based Gesture Interaction, Devlin Cronin

Master's Theses

Human-Computer Interaction is a rapidly expanding field, in which new implementations of ideas are consistently being released. In recent years, much of the concentration in this field has been on gesture-based control, either touch-based or camera-based. Even though camera-based gesture recognition was previously seen more in science fiction than in reality, this method of interaction is rising in popularity. There are a number of devices readily available to the average consumer that are designed to support this type of input, including the popular Microsoft Kinect and Leap Motion devices.

Despite this rise in availability and popularity, development for these devices …


Smarter Neat Nets, Ryan Swords Dehaven Aug 2013

Smarter Neat Nets, Ryan Swords Dehaven

Master's Theses

This paper discusses a modification to improve usability and functionality of a ge- netic neural net algorithm called NEAT (NeuroEvolution of Augmenting Topolo- gies). The modification aims to accomplish its goal by automatically changing parameters used by the algorithm with little input from a user. The advan- tage of the modification is to reduce the guesswork needed to setup a successful experiment with NEAT that produces a usable Artificial Intelligence (AI). The modified algorithm is tested against the unmodified NEAT with several different setups and the results are discussed. The algorithm shows strengths in some areas but can increase the …


Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky Jun 2013

Real Time Visibility Culling With Hardware Occlusion Queries And Uniform Grids, Ilya Iseletsk Seletsky

Master's Theses

Culling out non-visible portions of 3D scenes is important for rendering large complex worlds at an interactive frame rate. Past 3D engines used static prebaked visibility data which was generated using complex algorithms. Hardware Occlusion Queries are a modern feature that allows engines to determine if objects are invisible on the fly. This allows for fully dynamic destructible and editable environments as opposed to static prebaked environments of the past. This paper presents an algorithm that uses Hardware Occlusion Queries to cull fully dynamic scenes in real-time. This algorithm is relatively simple in comparison to other real-time occlusion culling techniques, …


Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White Jun 2013

Paris: A Parallel Rsa-Prime Inspection Tool, Joseph R. White

Master's Theses

Modern-day computer security relies heavily on cryptography as a means to protect the data that we have become increasingly reliant on. As the Internet becomes more ubiquitous, methods of security must be better than ever. Validation tools can be leveraged to help increase our confidence and accountability for methods we employ to secure our systems.

Security validation, however, can be difficult and time-consuming. As our computational ability increases, calculations that were once considered “hard” due to length of computation, can now be done in minutes. We are constantly increasing the size of our keys and attempting to make computations harder …


Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero Dec 2012

Amaethon – A Web Application For Farm Management And An Assessment Of Its Utility, Tyler Yero

Master's Theses

Amaethon is a web application that is designed for enterprise farm management. It takes a job typically performed with spreadsheets, paper, or custom software and puts it on the web. Farm administration personnel may use it to schedule farm operations and manage their resources and equipment. A survey was con- ducted to assess Amaethon’s user interface design. Participants in the survey were two groups of students and a small group of agriculture professionals. Among other results, the survey indicated that a calendar interface inside Amaethon was preferred, and statistically no less effective, than a map interface. This is despite the …


Efficient Algorithms For Improving The Accuracy In Motifs Prediction, Jerlin C. Merlin Sep 2012

Efficient Algorithms For Improving The Accuracy In Motifs Prediction, Jerlin C. Merlin

Master's Theses

Analysis of sequence homology has always played a major role in the understanding of biological factors such as protein domain identification, gene product relationships, and gene function determination. Short contiguous protein sequences that are conserved across proteins provide important information about such factors, and are of at most 15 residues in length. These segments of proteins are known as minimotifs. Identifying minimotifs has been of much use in the formulation of the hypothesis about the biological functions that otherwise might be uncharacterized. Mechanisms of motif predictions such as Minimotif Miner are widely used for predicting minimotifs. However, due to the …


Lottery Scheduling In The Linux Kernel: A Closer Look, David Zepp Jun 2012

Lottery Scheduling In The Linux Kernel: A Closer Look, David Zepp

Master's Theses

This paper presents an implementation of a lottery scheduler, presented from design through debugging to performance testing. Desirable characteristics of a general purpose scheduler include low overhead, good overall system performance for a variety of process types, and fair scheduling behavior. Testing is performed, along with an analysis of the results measuring the lottery scheduler against these characteristics. Lottery scheduling is found to provide better than average control over the relative execution rates of processes. The results show that lottery scheduling functions as a good mechanism for sharing the CPU fairly between users that are competing for the resource. While …


An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri Mar 2012

An Interactive Visualization Model For Analyzing Data Storage System Workloads, Steven Charubhat Pungdumri

Master's Theses

The performance of hard disks has become increasingly important as the volume of data storage increases. At the bottom level of large-scale storage networks is the hard disk. Despite the importance of hard drives in a storage network, it is often difficult to analyze the performance of hard disks due to the sheer size of the datasets seen by hard disks. Additionally, hard drive workloads can have several multi-dimensional characteristics, such as access time, queue depth and block-address space. The result is that hard drive workloads are extremely diverse and large, making extracting meaningful information from hard drive workloads very …